Show Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (21)Which action requires an organization to carry out a Privacy Impact Assessment? A. Storing paper-based records B. Collecting PII to store in a new information system What is the purpose of a Privacy Impact Assessment (PIA)? A. Determine whether paper-based records are stored securely C. Determine whether the collection and maintenance of PII is worth the risk to individuals T or F? Information that can be combined with other information to link solely to an individual is considered PII. True What guidance identifies federal information security controls? A. DoD 5400.11-R: DoD Privacy
Program C. OMB Memorandum M-17-12: Preparing for and Responding to a Breach of Personally Identifiable Information An organization that fails to protect PII can face consequences including: A. Remediation costs D. All of the above If someone tampers with or steals and individual's PII, they could be exposed to which of the following? A. Embarrassment D. All of the above Which of the following is not an example of PII? A.
Fingerprints D. Pet's nickname What law establishes the federal government's legal responsibility for safeguarding PII? A. OMB Memorandum M-12-12: Preparing for and Responding to a Breach of Personally Identifiable Information C. The Privacy Act of 1974 An organization with existing system of records decides to start using PII for a new purpose outside the "routine use" defined in the System of Records Notice (SORN). Is this a permitted use? A. Yes B. No Which of the following is responsible for the most recent PII data breaches? A. Physical breaking and entry C. Phishing Which of the following is not an example of an administrative safeguard that organizations use to protect PII? A. Conduct risk assessments C. List all potential future uses of PII in the System of Records Notice (SORN) Within what timeframe must DoD organizations report PII breaches to the United States Computer Emergency Readiness Team (US-CERT) once discovered? A. 1 Hour A. 1 Hour Officials or employees who knowingly disclose PII to someone without a need-to-know may be subject to which of the following? A. Civil penalties B. Criminal penalties Your organization has a new requirement for annual security training. To track training completion, they are using employee Social Security Numbers as a record identification. Is this compliant with PII safeguarding procedures? A. Yes B. No Identify if a PIA is required: A. PII records are only in paper form. F. B and D Which of the following is NOT included in a breach notification? A. Articles and other media reporting the breach. A. Articles and other media reporting the breach. T or F? Misuse of PII can result in legal liability of the individual. True Which regulation governs the DoD Privacy Program? A. DoD 5400.11-R: DoD Privacy Program A. DoD 5400.11-R: DoD Privacy Program T or F? Using a social security number to track individuals' training requirements is an acceptable use of PII. False T or F? Misuse of PII can result in legal liability of the organization. True Which type of safeguarding measure involves restricting PII access to people with a need-to-know? A. Administrative A. Administrative Sets found in the same folderWNSF PII Personally Identifiable Information (PII)…13 terms kpsych4 DoD Mandatory Controlled Unclassified Information…15 terms Arsenal619 DoD Mandatory Controlled Unclassified Information…20 terms chloezendt12 Malicious Code9 terms aastrii Verified questions
SOCIOLOGY According to Hochschild’s second shift explanation, gender equity in the home does not exist. Why do men, on average, still do less housework than women? Do attitudes about masculinity have anything to do with this? Do women naturally feel inclined to do the housework, given their role as nurturers and caretakers? How might gender stereotypes contribute to inequality in the household? Verified answer
SOCIOLOGY Discuss the cause-and-effect relationship between competition and monopolies and oligopolies. Verified answer
SOCIOLOGY What is the difference between authority and coercion? Verified answer
SOCIOLOGY Give one reason why the gap between men’s and women’s salaries persists. Verified answer Other Quizlet setsSPA 4326 Final62 terms lindz2000 Permit test DMV questions76 terms Georgia_Wandersee ASC171: Week 4. Nervous System144 terms OatmealWednesdayPLUS Chapter 1376 terms pyoung1134 Related questionsQUESTION Communities that focus on resort activities (Branson, MO) 2 answers QUESTION Historian Eric Hosbawm's book, Nations and Nationalism Since 1780: Programme, Myth, Reality - what does he have to say? 11 answers QUESTION Which social media space zone primarily assists in the online buying and selling of products/services? 11 answers QUESTION Ensuring data backups for data stored on a desktop or laptop computer is generally considered: 4 answers What are the administrative safeguard that organizations use to protect PII?Ensure all printed documents with PII are properly marked with “FOR OFFICIAL USE ONLY.” As a best practice, use a “Privacy Act Data Cover Sheet” (DD Form 2923) as a cover when handling PII. Safeguard all documents when not in your direct possession by prohibiting access by those without an official need to know.
What are examples of PII?Personal identification numbers: social security number (SSN), passport number, driver's license number, taxpayer identification number, patient identification number, financial account number, or credit card number. Personal address information: street address, or email address. Personal telephone numbers.
Which of the following is not an example of PII?Info such as business phone numbers and race, religion, gender, workplace, and job titles are typically not considered PII.
What is responsible for most of the recent PII data breaches?Data Security Operations Personnel
Personnel who manage IT security operations on a day-to-day basis are the most likely to make mistakes that result in a data breach. According to a 2014 report, 95 percent of all cyber security incidents occur as a result of human error.
|